J
Julian Thomas
Researcher at IBM
Publications - 14
Citations - 637
Julian Thomas is an academic researcher from IBM. The author has contributed to research in topics: Key management & Key (cryptography). The author has an hindex of 10, co-authored 14 publications receiving 637 citations.
Papers
More filters
Patent
Internally distributed monitoring system
TL;DR: In this article, an embedded hardware/software monitor for a data processing system is presented, which embeds and distributes a plurality of instrumentation table units within various hardware entities in the system to collect sampled hardware signals local in the hardware entity in which the respective ITU is embedded, e.g. in each CPU, I/O processor, system controller, main storage controller etc.
Patent
Secure management of keys using control vectors
Stephen M. Matyas,Dennis G. Abraham,Donald B. Johnson,Ramesh K. Karne,An V. Le,Rostislaw Prymak,Julian Thomas,John D. Wilkins,Phil C. Yeh +8 more
TL;DR: In this paper, an apparatus and method for validating that key management functions requested for a cryptographic key by the program have been authorized by the originator of the key is presented.
Patent
Data cryptography operations using control vectors
Stephen M. Matyas,Dennis G. Abraham,Donald B. Johnson,Ramesh K. Karne,An V. Le,Rostislaw Prymak,Julian Thomas,John D. Wilkins,Phil C. Yeh +8 more
TL;DR: In this paper, the authors propose a control vector which provides the authorization for the uses of the data cryptography key intended by the originator of the key, among the uses specified by the control vector are limitations on encryption, decryption, authentication code generation and verification, translation of the user's data.
Patent
Data cryptography using control vectors
Stephen M. Matyas,Dennis G. Abraham,Donald B. Johnson,Ramesh K. Karne,An V. Le,Rostislaw Prymak,Julian Thomas,John D. Wilkins,Phil C. Yeh +8 more
TL;DR: In this paper, data cryptography is achieved in an improved manner by associating with the data cryptography key, a control vector which provides the authorisation for the uses of the key intended by the originator.
Patent
System and method for preventing deadlock in multiprocessor multiple resource instructions
TL;DR: In this article, a system and method for preventing deadlock in a multiprocessor computer system executing instructions requiring multiple resources is presented. Butler et al. propose a global lock that can be held by at most one processor.